A Security Policy Based upon Hardware Encryption.
Scott J. HarperPeter M. AthanasPublished in: HICSS (2004)
Keyphrases
- security policies
- access control
- security management
- network security
- low cost
- hardware and software
- security requirements
- network access
- security concerns
- distributed systems
- access control systems
- ubiquitous computing environments
- home network
- security architecture
- network management
- computer systems
- access control policies
- unauthorized access
- embedded systems
- key management
- relational databases
- access control mechanism
- fine grained
- network traffic